Sciweavers

2487 search results - page 334 / 498
» cases 2009
Sort
View
114
Voted
NORDSEC
2009
Springer
15 years 7 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
NOSSDAV
2009
Springer
15 years 7 months ago
SLIPstream: scalable low-latency interactive perception on streaming data
A critical problem in implementing interactive perception applications is the considerable computational cost of current computer vision and machine learning algorithms, which typ...
Padmanabhan Pillai, Lily B. Mummert, Steven W. Sch...
OTM
2009
Springer
15 years 7 months ago
Merging Sets of Taxonomically Organized Data Using Concept Mappings under Uncertainty
Abstract. We present a method for using aligned ontologies to merge taxonomically organized data sets that have apparently compatible schemas, but potentially different semantics f...
David Thau, Shawn Bowers, Bertram Ludäscher
83
Voted
PET
2009
Springer
15 years 7 months ago
Scalable Link-Based Relay Selection for Anonymous Routing
The performance of an anonymous path can be described using many network metrics – e.g., bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have ...
Micah Sherr, Matt Blaze, Boon Thau Loo
112
Voted
PKDD
2009
Springer
153views Data Mining» more  PKDD 2009»
15 years 7 months ago
Subspace Regularization: A New Semi-supervised Learning Method
Most existing semi-supervised learning methods are based on the smoothness assumption that data points in the same high density region should have the same label. This assumption, ...
Yan-Ming Zhang, Xinwen Hou, Shiming Xiang, Cheng-L...